Wednesday, February 27, 2013

Computer Security

Date: Sunday, September 30, 2012
Case Study
Computer gage is not an issue for organizations alone. Anyone whose individualised computer is connected to a mesh topology or the Internet faces a potential risk of attack. identify all the potential security threats on a person-to-person computer. Identify some of the techniques an attacker might employ to entrance schooling on the system.
Computer Security
Computer Security on a Personal Computer
Recent statistics show that a boastful percentage of people have the notion that computer security is an issue that only affects organizations. Many people believe that, at a person-to-person level, on that point is little that one base have to do with their information especially because they dont see if someone may need their information. In contrast, in that location is a lot of useful informational that a third company may obtain from a personal computer that the drug user may not even realize (Barrett, 2009). For instance, a user may be having sensitive information that would lead to his or her private life secrets, or even crucial pecuniary information. Such information can be used by attackers to monitor their internet activities, while they are logged in their personal computer whether at a local network, or on the internet.

Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.

The victims sensitive information can be shared over the internet, or sold to third-parties such as advertisers and criminals among others (AmeComputers, 2012). As such, it is important that serious security measures are taken to protect ones personal computer from such security issues. This paper, therefore, seeks to justify the need for computer security by investigating the potential security risks on a personal computer.
2.0 Potential Security Threats on a Personal Computer
Apparently, there are numerous security threats that an individual on a personal computer is exposed to, provided they are connected through a local network or the internet (Barrett, 2009; Gregg, 2006). This is because information is crucial; hence, people and...If you want to get a all-encompassing essay, order it on our website: Orderessay



If you want to get a full essay, wisit our page: write my essay .

No comments:

Post a Comment